Events Calendar

Mon
Tue
Wed
Thu
Fri
Sat
Sun
M
T
W
T
F
S
S
26
27
29
30
31
1
2
5
7
8
12
13
14
16
17
21
22
23
24
25
26
27
28
1
Proper Management of Medicare/Medicaid Overpayments to Limit Risk of False Claims
2015-01-28    
1:00 pm - 3:00 pm
January 28, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9AM AKST | 8AM HAST Topics Covered: Identify [...]
EhealthInitiative Annual Conference 2015
2015-02-03 - 2015-02-05    
All Day
About the Annual Conference Interoperability: Building Consensus Through the 2020 Roadmap eHealth Initiative’s 2015 Annual Conference & Member Meetings, February 3-5 in Washington, DC will [...]
Real or Imaginary -- Manipulation of digital medical records
2015-02-04    
1:00 pm - 3:00 pm
February 04, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Orlando Regional Conference
2015-02-06    
All Day
February 06, 2015 Lake Buena Vista, FL Topics Covered: Hot Topics in Compliance Compliance and Quality of Care Readying the Compliance Department for ICD-10 Compliance [...]
Patient Engagement Summit
2015-02-09 - 2015-02-10    
12:00 am
THE “BLOCKBUSTER DRUG OF THE 21ST CENTURY” Patient engagement is one of the hottest topics in healthcare today.  Many industry stakeholders consider patient engagement, as [...]
iHT2 Health IT Summit in Miami
2015-02-10 - 2015-02-11    
All Day
February 10-11, 2015 iHT2 [eye-h-tee-squared]: 1. an awe-inspiring summit featuring some of the world.s best and brightest. 2. great food for thought that will leave you begging [...]
Starting Urgent Care Business with Confidence
2015-02-11    
1:00 pm - 3:00 pm
February 11, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Managed Care Compliance Conference
2015-02-15 - 2015-02-18    
All Day
February 15, 2015 - February 18, 2015 Las Vegas, NV Prospectus Learn essential information for those involved with the management of compliance at health plans. [...]
Healthcare Systems Process Improvement Conference 2015
2015-02-18 - 2015-02-20    
All Day
BE A PART OF THE 2015 CONFERENCE! The Healthcare Systems Process Improvement Conference 2015 is your source for the latest in operational and quality improvement tools, methods [...]
A Practical Guide to Using Encryption for Reducing HIPAA Data Breach Risk
2015-02-18    
1:00 pm - 3:00 pm
February 18, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Compliance Strategies to Protect your Revenue in a Changing Regulatory Environment
2015-02-19    
1:00 pm - 3:30 pm
February 19, 2015 Web Conference 12pm CST | 1pm EST | 11am MT | 10am PST | 9am AKST | 8am HAST Main points covered: [...]
Dallas Regional Conference
2015-02-20    
All Day
February 20, 2015 Grapevine, TX Topics Covered: An Update on Government Enforcement Actions from the OIG OIG and US Attorney’s Office ICD 10 HIPAA – [...]
Events on 2015-02-03
EhealthInitiative Annual Conference 2015
3 Feb 15
2500 Calvert Street
Events on 2015-02-06
Orlando Regional Conference
6 Feb 15
Lake Buena Vista
Events on 2015-02-09
Events on 2015-02-10
Events on 2015-02-11
Events on 2015-02-15
Events on 2015-02-20
Dallas Regional Conference
20 Feb 15
Grapevine
Latest News

The Stimulus Act Started a Cyber Crime Wave of Medical Data Theft

improving the health
Thanks to the Recovery Act’s push to digitize health records, your most precious and valuable information is within the reach of most thieves.Cyber criminals are coming after your medical data and you can blame Congress for that.
Six years after the American Recovery and Reinvestment Act of 2009 opened the floodgates to digitized medical records, so-called “protected health information” is now the most precious commodity in pilfered consumer data—fetching up to ten times the price of a stolen credit card number on the “dark Web.”A report from International Data Corporation this month forecasts that one-in-three consumers will have their health data compromised next year due to weak cybersecurity.

In May, the Ponemon Institute found that criminal attacks on health care organizations are up 125 percent since 2010. And according to a survey of health care technology professionals released in August by KPMG, 81 percent of medical organizations have been targeted by a cyberattack or malicious software—with more than one-in-ten acknowledging two or more attacks per week.

In its monthly disclosure report for November the Department of Veterans Affairs revealed that out of 693 individual records breaches, 616 involved personal health information. While many of these are attributed to employee negligence, the agency reported that it blocked more than 178 million attempts to breach its networks last month.

It’s not that thieves are only now recognizing the value of consumer medical data. Rather, they are targeting a prize that was largely unavailable to them until Congress put it within their reach.

The Health Information Technology for Economic and Clinical Health (HITECH) Act—a component of President Obama’s economic stimulus package—included billions of dollars to support the migration of static, paper-based medical records into electronic databases. Using the tagline “Go Paperless and Get Paid,” the Centers for Medicare & Medicaid Services has shelled out more than $30 billion to date in subsidies to promote the adoption of Electronic Health Records (EHR).

Starting this year, Medicare-eligible providers who aren’t “meaningful users” of electronic medical records will begin facing penalties.

Without a corresponding push to compel investments in security, however, the majority of medical providers incorporated EHR into legacy systems that lacked the technology required to protect it. This created an open pathway for thieves who once would have faced a lock door.

Last month, Donald Good—deputy assistant director of cyberintelligence and outreach at the Federal Bureau of Investigation—told a gathering of health care IT professionals in Washington, D.C. that the industry has yet to reconcile the limitations of legacy IT, even as it makes the leap to next-generation mobile devices.

“For a number of years, folks I think realized there was a threat out there, but it wasn’t as pervasive as it is today,” Good said.

A top-level IT manager at a major university health system in the Northeast told me recently that his organization is just now in the process of locking down patient data.

“We never lost any data so no one thought it was a problem,” he said, requesting anonymity on the grounds he could lose his job for speaking out. “The level of vulnerability is astounding.”

The majority of health care providers share that same pessimism. According to a survey released this month by the company Privacy Analytics, more than two-thirds of health care organizations lack confidence in their ability to protect patient data.

While Obama’s stimulus package has been a favored whipping post for conservative lawmakers, the push to digitize patient records was a bipartisan effort—aided by strong lobbying by the health IT sector.

Source